Forrester DLP Wave 2016

 

New DLP Report to be Released

 

In a few days, Forrester Research releases its first DLP Wave report in over 6 years. Titled “The Forrester WaveTM: Data Loss Prevention Solutions, Q4 2016″, will offer opinions on many different “DLP” solutions.  Much has changed over the last decade of Data Loss / Leak Prevention, with the majority of the old DLP wave solutions being acquired and/or taped together with stale acquisitions, some Wave leaders have even been put to rest.

It will be very interesting to read these opinions and see how the analysts’ value / weigh the different facets of Enterprise DLP  and place (Challengers, Contenders, Strong Performers, and Leaders)  the players, including our own DLP that WorksTM Platform.

[spacer]

Contact us to schedule your “Review of the DLP Wave”

Error: Contact form not found.

[spacer]

DLP that actually Works

Visibility: Accurately, discover sensitive data; detect and address broken business process, or insider threats including sensitive data breach attempts.

Protection: Automate data protection, breach prevention and incident response both on and off the network; for example, find and quarantine sensitive data within files exposed on user workstations, FileShares and cloud storage.

Notification: Alert and educate users on violations to raise awareness and educate the end user about cybersecurity and corporate policies.

Education: Start target cyber-security training; e.g., identify end-users violating policies and train them.

  • Employees and organizations have knowledge and control of the information leaving the organization, where it is being sent, and where it is being preserved.
  • Ability to allow user classification to give them influence in how the data they produce is controlled, which increases protection and end-user adoption.
  • Control your data across your entire domain in one Central Management Dashboard with Universal policies.
  • Many levels of control together with the ability to warn end-users of possible non-compliant – risky activities, protecting from malicious insiders and human error.
  • Full data discovery collection detects sensitive data anywhere it is stored, and provides strong classification, watermarking, and other controls.
  • Delivers full technical controls on who can copy what data, to what devices, what can be printed, and/or watermarked.
  • Integrate with GRC workflows.
  • Reduce the risk of fines and non-compliance.
  • Protect intellectual property and corporate assets.
  • Ensure compliance within industry, regulatory, and corporate policy.
  • Ability to enforce boundaries and control what types of sensitive information can flow where.
  • Control data flow to third parties and between business units.